Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for user authentification using non-language words

Active Publication Date: 2010-04-29
XEROX CORP
View PDF8 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0014]In another embodiment of the present disclosure, the instruction includes a second instruction to recite at least one language word. The sound signal can further include a response to the second instruction. The voice authentication component can further authenticate the voice of the user using the response to the second instruction. The at least one language word can be randomly chosen among a plurality of language words.

Problems solved by technology

The small number of allowable characters (10) coupled with a pin numbers of 4 to 6 digits (enough to hold a birth date, for example) make them less than ideal than digital keys (with a usual length of 128 or 256 bits), in certain environments; however, digital keys are unsuitable for use with some cell phones models.
Some mobile devices have limited security capabilities because of the limitations of the hardware.
Biometric devices, such as fingerprint readers, can be conveniently attached to a desktop computer, but it is unreasonable to expect mobile users to carry bulky models of fingerprint readers around to attach to their cell phone whenever they want to perform a sensitive transaction.
If proper security precautions are not implemented and the phone falls into skilled hands, security breaches may be possible.
It must also avoid using a subject's social security number, since storing and transmitting SSNs create an unacceptable risk for identity theft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for user authentification using non-language words
  • System and method for user authentification using non-language words
  • System and method for user authentification using non-language words

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]Referring to the drawings, FIG. 1 is a block diagram of a system 100 for user authentication using non-language words in accordance with the present disclosure. System 100 may be implemented, wholly or partially, in hardware, software, software in execution, firmware, microcode, CPLDs, PALs, FPLGs, hardware description language, bytecode, a virtual machine, emulation, on one or more processors and the like. For example, system 100 may be implemented by one or more x86-processor based computers (not shown).

[0027]System 100 can authenticate a user (not shown) using a user's voice. Specifically, system 100 can authenticate a user's voice using cell phone 102. A person's voice is somewhat specific to that person in the same way a fingerprint or a person's iris is specific to a person. This quality makes a person's voice well suited for authentication. Cell phone 102 operatively communicates with telephone interface component 104. Cell phone 102 may be considered part of or separat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for user authentication include a user instructing component and a voice authentication component. The user instructing component generates an instruction for authenticating a voice of a user. The instruction includes a first instruction to recite one or more non-language words. The voice authentication component analyzes a sound signal which includes a response to the instruction. The voice authentication component can authenticate the voice of the user using the response to the instruction including a response to the first instruction to recite the one or more non-language words.

Description

BACKGROUND[0001]1. Technical Field[0002]The present disclosure relates to user authentication, and in particular, to a system and method for user authentication using non-language words.[0003]2. Description of Related Art[0004]Certain organizations engage in sensitive transactions, such as banks, brokerage houses, the military, intelligence services and other entities. Some of these services deal with information that may be personally, financially or even legally sensitive. Many of these transactions are conducted from remote locations using communications technologies such as the internet, land based phones (e.g., Voip or POTS), cell phones, IP based phones, using ATM machines and the like. Additionally, remote authentication is sometimes employed to control access to facilities or buildings; for example, an organization may have several facilities located throughout the world with each having several entrances. Security protocols to these various facilities or entrances may inclu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCG06F21/32G06Q20/32G06Q20/4014H04L2209/56H04M3/4936H04L9/3231H04L2209/34G10L17/24
Inventor VANDERVORT, DAVID RUSSELL
Owner XEROX CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products